Jump to content

cr4ckerK9

Members
  • Posts

    10
  • Joined

  • Last visited

Posts posted by cr4ckerK9

  1. RC6 Source Code


    /* This is an independent implementation of the encryption algorithm: */
    /* */
    /* RC6 by Ron Rivest and RSA Labs */
    /* */
    /* which is a candidate algorithm in the Advanced Encryption Standard */
    /* programme of the US National Institute of Standards and Technology. */
    /* */
    /* Copyright in this implementation is held by Dr B R Gladman but I */
    /* hereby give permission for its free direct or derivative use subject */
    /* to acknowledgment of its origin and compliance with any conditions */
    /* that the originators of the algorithm place on its exploitation. */
    /* */
    /* Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 */

    /* Timing data for RC6 (rc6.c)

    128 bit key:
    Key Setup: 1632 cycles
    Encrypt: 270 cycles = 94.8 mbits/sec
    Decrypt: 226 cycles = 113.3 mbits/sec
    Mean: 248 cycles = 103.2 mbits/sec

    192 bit key:
    Key Setup: 1885 cycles
    Encrypt: 267 cycles = 95.9 mbits/sec
    Decrypt: 235 cycles = 108.9 mbits/sec
    Mean: 251 cycles = 102.0 mbits/sec

    256 bit key:
    Key Setup: 1877 cycles
    Encrypt: 270 cycles = 94.8 mbits/sec
    Decrypt: 227 cycles = 112.8 mbits/sec
    Mean: 249 cycles = 103.0 mbits/sec

    */

    #include "../std_defs.h"

    static char *alg_name[] = { "rc6", "rc6.c", "rc6" };

    char **cipher_name()
    {
    return alg_name;
    }

    #define f_rnd(i,a,b,c,d) \
    u = rotl(d * (d + d + 1), 5); \
    t = rotl(b * (b + b + 1), 5); \
    a = rotl(a ^ t, u) + l_key[i]; \
    c = rotl(c ^ u, t) + l_key[i + 1]

    #define i_rnd(i,a,b,c,d) \
    u = rotl(d * (d + d + 1), 5); \
    t = rotl(b * (b + b + 1), 5); \
    c = rotr(c - l_key[i + 1], t) ^ u; \
    a = rotr(a - l_key[i], u) ^ t

    u4byte l_key[44]; /* storage for the key schedule */

    /* initialise the key schedule from the user supplied key */

    u4byte *set_key(const u4byte in_key[], const u4byte key_len)
    { u4byte i, j, k, a, b, l[8], t;

    l_key[0] = 0xb7e15163;

    for(k = 1; k < 44; ++k)

    l_key[k] = l_key[k - 1] + 0x9e3779b9;

    for(k = 0; k < key_len / 32; ++k)

    l[k] = in_key[k];

    t = (key_len / 32) - 1; // t = (key_len / 32);

    a = b = i = j = 0;

    for(k = 0; k < 132; ++k)
    { a = rotl(l_key[i] + a + b, 3); b += a;
    b = rotl(l[j] + b, ;
    l_key[i] = a; l[j] = b;
    i = (i == 43 ? 0 : i + 1); // i = (i + 1) % 44;
    j = (j == t ? 0 : j + 1); // j = (j + 1) % t;
    }

    return l_key;
    };

    /* encrypt a block of text */

    void encrypt(const u4byte in_blk[4], u4byte out_blk[4])
    { u4byte a,b,c,d,t,u;

    a = in_blk[0]; b = in_blk[1] + l_key[0];
    c = in_blk[2]; d = in_blk[3] + l_key[1];

    f_rnd( 2,a,b,c,d); f_rnd( 4,b,c,d,a);
    f_rnd( 6,c,d,a,; f_rnd( 8,d,a,b,c);
    f_rnd(10,a,b,c,d); f_rnd(12,b,c,d,a);
    f_rnd(14,c,d,a,; f_rnd(16,d,a,b,c);
    f_rnd(18,a,b,c,d); f_rnd(20,b,c,d,a);
    f_rnd(22,c,d,a,; f_rnd(24,d,a,b,c);
    f_rnd(26,a,b,c,d); f_rnd(28,b,c,d,a);
    f_rnd(30,c,d,a,; f_rnd(32,d,a,b,c);
    f_rnd(34,a,b,c,d); f_rnd(36,b,c,d,a);
    f_rnd(38,c,d,a,; f_rnd(40,d,a,b,c);

    out_blk[0] = a + l_key[42]; out_blk[1] = b;
    out_blk[2] = c + l_key[43]; out_blk[3] = d;
    };

    /* decrypt a block of text */

    void decrypt(const u4byte in_blk[4], u4byte out_blk[4])
    { u4byte a,b,c,d,t,u;

    d = in_blk[3]; c = in_blk[2] - l_key[43];
    b = in_blk[1]; a = in_blk[0] - l_key[42];

    i_rnd(40,d,a,b,c); i_rnd(38,c,d,a,;
    i_rnd(36,b,c,d,a); i_rnd(34,a,b,c,d);
    i_rnd(32,d,a,b,c); i_rnd(30,c,d,a,;
    i_rnd(28,b,c,d,a); i_rnd(26,a,b,c,d);
    i_rnd(24,d,a,b,c); i_rnd(22,c,d,a,;
    i_rnd(20,b,c,d,a); i_rnd(18,a,b,c,d);
    i_rnd(16,d,a,b,c); i_rnd(14,c,d,a,;
    i_rnd(12,b,c,d,a); i_rnd(10,a,b,c,d);
    i_rnd( 8,d,a,b,c); i_rnd( 6,c,d,a,;
    i_rnd( 4,b,c,d,a); i_rnd( 2,a,b,c,d);

    out_blk[3] = d - l_key[1]; out_blk[2] = c;
    out_blk[1] = b - l_key[0]; out_blk[0] = a;
    };

  2. The Big Book of Windows Hacks,Tips and Tools

    2i7lil4.jpg

    Author: Preston Gralla

    Paperback: 652 pages

    Publisher: O'Reilly Media, Inc.; 1 edition (October 23, 2007)

    Language: English

    ISBN-10: 0596528353

    ISBN-13: 978-0596528355

    Format: pdf

    Details:

    Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB key, or hack the "unhackable" screensavers, you'll find quick and ingenious ways to bend these recalcitrant operating systems to your will.

    The Big Book of Windows Hacks focuses on Vista, the new bad boy on Microsoft's block, with hacks and workarounds that also work for Windows XP. You can read each hack in just a few minutes, saving countless hours of searching for the right answer. The step-by-step instructions let you apply the solutions in no time. This book takes you beyond the operating system with hacks for applications like Internet Explorer 7 and Office 2007, and hardware such as the Zune, your wireless router, and the PC itself.

    The Big Book of Windows Hacks includes:

    Expanded tutorials, new background material, a series of "quick hacks", and informative sidebars

    Security hacks, including protection at wireless hotspots, hacking Vista file permissions and user account protection, and more

    Efficiency hacks, such as tweaking your PC hardware, troubleshooting hardware problems, and speeding up system performance

    Fun hacks, like building a custom Media Center PC or turning a PC into a digital video recorder

    "Beyond Windows" hacks for running Linux inside Vista, dual-booting Linux/Windows or XP/Vista, or emulate classic video games on your PC

    In all, this remarkable book contains more than 100 hacks so that the power user in you never again needs to be at the mercy of systems and hardware run by Microsoft's omnipotent Vista and XP operating systems.

    Download:

    RapidShare: Easy Filehosting

    RapidShare: Easy Filehosting

    RapidShare: Easy Filehosting

  3. Pro Decrypting VBScript Viruses

    pro.jpg

    Author: Martini Fakhrou

    Paperback: 46 pages

    Publisher: MARTANI eXpress (April 2008)

    Language English

    ISBN-10: N/A

    ISBN-13: N/A

    Format: pdf

    Details:

    In this book, you will learn how to decrypt a VBScript and find the original source code; it will also teach you a number of techniques used by hackers to protect their source code. That may be so effective for use with your own code or your secret algorithms, which is very useful.

    This book will not talk about the virus behavior or its VBScript specified functions right now (another book will discuss the VBScript viruses behavior wait for it?, you check for other related books), it is intended to discuss the methods hackers use to obfuscate their source code so others can’t understand it. And AVs cannot just detect the threats so early.

    I gave also some examples about some easy-to-understand viruses and other algorithms I found on the web, so they can make a good base you can start from, I also mention some ways of decrypting Encoded scripts by the WSD (Windows Script Decoder), but I don’t provide any tools or real codes (you know Microsoft and the Copyrights!!!!).

    Also, this book supposes that you have a little knowledge about VBScript and scripting in general. It will not teach you VBScript, if you wish learn VBScript those books are so good to start: wrox vbscript programmer's reference or Sams VBScript WMI and ADSI Unleashed.

    Another more thing: there is no Technical Reviewer or any help from others, I wrote this book alone, if there are some errors you can understand the situation, also English is not my language, so expect lots of grammatical mistakes, your help is welcome about that of course.

    http://rapidshare.com/files/144745737/Pro.Decg.VBs.Viruses.rar.html

  4. The Most Wanted Hacking Books

    List of Books :

    A Buffer Overflow Study - Attacks and Defenses

    Wi-Foo The Secrets of Wireless Hacking

    Amazon Hacks

    Computer Vulnerability

    Crackproof Your Software

    Credit Card Visa Hack

    Ethical Hacking and Countermeasures EC Council Exam

    Google Hacking for Penetration Tester

    Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit

    Hack IT Security Through Penetration Testing

    Hack Proofing Your Identity in the Information Age

    Hack Proofing Your Network

    Hacker Disassembling Uncovered

    Hacker's Desk Reference

    Hackers Beware

    Hackers Delight

    Hacking Exposed - Network Security Secrets and Solutions

    Hacking Exposed - Web Applications

    Hacking Exposed - Windows 2003

    Hacking for Dummies

    Hacking for Dummies - Access to Other Peoples Systems Made Simple

    Hacking Guide

    Hacking - The Art of Exploitation

    How Thieves Targeted eBay Users but Got Stopped Instead

    Malware - Fighting Malicious Code

    Maximum Security

    Maximum Security - A Hackers Guide to Protect Your Internet

    Network Security Tools

    PC Hacks

    PDF Hack

    Practical Study Remote Access (Cisco)

    Reversing Secrets of Reverse Engineering

    Spidering Hacks

    What They Won't Tell You About the Internet

    Stealing the Network

    The Art of Deception

    The Art of Intrusion

    The Complete History of Hacking

    The Extreme Searchers Internet Handbook

    Tricks of the Internet Gurus

    Underground Hacking Madness

    Web Hacking- Attacks and Defence

    Windows Server Hack

    Windows XP Hacks

    DOWNLOAD :

    Lix.in - Linkprotection

    Lix.in - Linkprotection

    mirror:

    RapidShare: Easy Filehosting | 78033 KB

    RapidShare: Easy Filehosting | 96416 KB

    ----------

    thx. for me

×
×
  • Create New...